Re: Introduction: Interested in becoming a packager for fis-gtm and vista

2012-07-17 Thread Garrett Holmstrom

On 2012-07-16 22:50, Clive Hills wrote:

Coincidentally I was looking at gtm this weekend.
One of the interesting points in re packaging it is that one must
bootstrap gtm from an existing gtm using the providing source.
I'm wondering a bit how that might be affected by the Fedora packaging
guidelines?


You need to file a FPC ticket to get a one-time exception.

http://fedoraproject.org/wiki/Packaging:Guidelines#Exceptions says:

Some software (usually related to compilers or cross-compiler 
environments) cannot be built without the use of a previous toolchain or 
development environment (open source). If you have a package which meets 
this criteria, contact the Fedora Packaging Committee for approval. 
Please note that this exception, if granted, is limited to only the 
initial build of the package. You may bootstrap this build with a 
bootstrap pre-built binary, but after this is complete, you must 
immediately increment Release, drop the bootstrap pre-built binary, 
and build completely from source. Bootstrapped packages containing 
pre-built bootstrap binaries must not be pushed as release packages or 
updates under any circumstances. These packages should contain the 
necessary logic to be built once bootstrapping is completed and the 
prebuilt programs are no longer needed. This can be done like this:


# Set this to 0 after we've bootstrapped
%{!? with_bootstrap: %global bootstrap 1}

[...]

%if 0%{?with_bootstrap}
  # Do stuff involving the prebuilt files
%else
  # The normal build
%endif
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Andrew Haley
On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
 Jan Kratochvil writes:
 
 On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
 And I wouldn't be so presumptions as to state authoritatively what
 is or is not a bug, in something whose purpose is not known to me.

 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX
 
 It is anything but normal. The normal state of things is documented by  
 proc(5). As documented by that man page, rather plainly,  
 readlink(/proc/self/exe) gives you your own pathname.

Yes, it's the pathname that started this process.  Yes, that pathname
may point to file that no longer exists.  That's UNIX.  That's how it
has always worked, and will always work.  Anyone programming in a UNIX
environment has to cope with it.

Andrew.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Bryn M. Reeves
On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
 Jan Kratochvil writes:
 
 On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
 And I wouldn't be so presumptions as to state authoritatively what
 is or is not a bug, in something whose purpose is not known to me.

 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX
 
 It is anything but normal. The normal state of things is documented by  
 proc(5). As documented by that man page, rather plainly,  
 readlink(/proc/self/exe) gives you your own pathname. That's the normal  
 state of things, if normal means anything. When that no longer holds true,  
 that's not normal.

As others have pointed out it is a normal situation that the system has
to deal with; there's no escaping it on a UNIX-like OS and a developer
can never depend on it not happening at random times.

The pathname that is returned to readlink(2) doesn't exist in the file
system (how could it?) but the proc path is still valid for IO and the
inode will not be de-allocated while it is open:

$ cp /bin/vim /tmp
$ /tmp/vim foo
$ ps ax | grep foo
 8904 pts/3S+ 0:00 ./vim foo
 8960 pts/4S+ 0:00 grep --color=auto foo
$ rm /tmp/vim
$ readlink /proc/8904/exe
/tmp/vim (deleted)
$ cat /proc/8904/exe  /tmp/vim.out
$ ll /tmp/vim.out
-rw-rw-r--. 1 breeves breeves 2097656 Jul 17 09:41 /tmp/vim.out
$ file /tmp/vim.out
/tmp/vim.out: ELF 64-bit LSB executable, x86-64, version 1 (SYSV),
dynamically linked (uses shared libs), for GNU/Linux 2.6.32,
BuildID[sha1]=0x695009d204a46dd413af6afc12207ee5f21fabf5, stripped
$ md5sum /tmp/vim.out
21f4752d9efdb68e6af1ff22b2652fde  /tmp/vim.out
$ md5sum /bin/vim
21f4752d9efdb68e6af1ff22b2652fde  /bin/vim
$ prelink -u -o - /tmp/vim.out | md5sum
c9b7e38bacad0b1c5e04b6c71a5f45b9  -
$ prelink -u -o - /bin/vim | md5sum
c9b7e38bacad0b1c5e04b6c71a5f45b9  -

If the check you need to make is is this the same binary? then surely
it should fail if the binary was actually upgraded? If it was not and
was simply modified by prelink then you should be able to do what you
want by open(2)ing the proc path instead of readlink(2)ing it.

If you're happy to accept something that's a different version of the
binary then I'm not sure why you need to read the executable (what are
you checking in it?). If it's just an inode number match it's hard to
see what that achieves.

 Broken maintenance scripts, of dubiuous benefit, that randomly rewrite  
 unrelated binaries, should be fixed.

Suggest fixes. If you're doing something unusual the onus is on you to
justify why the system should conform to your expectations instead of
the expectations it's currently designed for.

Regards,
Bryn.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: security repo

2012-07-17 Thread Bryn M. Reeves
On 07/17/2012 03:02 AM, Paul Wouters wrote:
 On Tue, 17 Jul 2012, Mike Manilone wrote:
 
 I think we can create a new repo called security like Debian. Push all
 the security updates to it.
 
 Uhm, we have that. It is called RHEL

Not quite although RHEL errata are also categorised as security, fix and
feature. The data for vulnerabilities is also made available in standard
formats (OVAL and CPE mappings for Red Hat products).

Regards,
Bryn.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Introduction: Interested in becoming a packager for fis-gtm and vista

2012-07-17 Thread Luis Ibanez
Clive,

It is great to hear that you are already interested in gtm.

The good news is that during the Debian packaging
we solved the bootstrapping problem. We worked
along with upstream and with Debian developers
to find a suitable solution.

The reason why gtm is needed in order to build gtm, is
that it pre-processes a set of input files, and generates
code from them. The pre-processing being done by a
gtm compiler.

What we did to break the self-dependency, was to include
in the source distribution (with the agreement of upstream)
the sources of the generated files.

In this way, the build process starts from the full collection
of sources (including the generated files) and no initial gtm
compiler is needed anymore.

In addition, to ensure consistency, once we build the gtm
compiler, we do a second round in which we regenerate
those files the traditional way, and do a second build pass.
In this manner we ensure consistency with the build process
that gtm has used so far.

To instrument all this, we also created a CMake configuration
for gtm, and that helped a lot to control all the details of the build.

The reorganized code that we worked on with upstream is
in this github repository (and branch):

https://github.com/luisibanez/fis-gtm/tree/hackathonjune2012-brad

The upstream team will be making a fresh release at some point
with this new collection of files, at:

http://sourceforge.net/projects/fis-gtm/
(not there yet).


If one works from the CMake-ified sources (in the github repository
above), the package can be built by using only gcc through:

cmake  .
make -j 4
make install


There were other modifications details, that we will be
happy to describe further if anyone is interested.


With this fis-gtm package, we were also able to build
the package for VistA. (where fis-gtm is the only
dependency for the vista package).


   Luis
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: security repo

2012-07-17 Thread Jussi Lehtola
On Tue, 17 Jul 2012 10:17:59 +0800
Mike Manilone crtm...@gmx.us wrote:
 於 一,2012-07-16 於 22:02 -0400,Paul Wouters 提到: 
  On Tue, 17 Jul 2012, Mike Manilone wrote:
  
   I think we can create a new repo called security like Debian.
   Push all the security updates to it.
  
  Uhm, we have that. It is called RHEL
  
  Paul
 No money to buy. :-)

CentOS, Scientific Linux, ...?
-- 
Jussi Lehtola
Fedora Project Contributor
jussileht...@fedoraproject.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Andrew Haley writes:


On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
 Jan Kratochvil writes:

 On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
 And I wouldn't be so presumptions as to state authoritatively what
 is or is not a bug, in something whose purpose is not known to me.

 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX

 It is anything but normal. The normal state of things is documented by
 proc(5). As documented by that man page, rather plainly,
 readlink(/proc/self/exe) gives you your own pathname.

Yes, it's the pathname that started this process.  Yes, that pathname
may point to file that no longer exists.  That's UNIX.


No, that's Linux with prelink installed.

Perhaps this might be a hard concept to wrap one's brain around, but there's  
a quite a bit of difference between this is an exceptional event, and  
that's what happens when i does, versus this is now a normal occurence  
that, with prelink installed, and can happen to any random executable, at  
any time.


Across the pond, I believe that there's a word to describe this: rubbish.  
How presumptious of an executable binary, that's not world-writable, to  
expect that nobody's going to come around, suddenly, and delete it! What  
would those kids think of next…



  /  That's how it
has always worked, and will always work.  Anyone programming in a UNIX
environment has to cope with it.


Sure. And since gruesome car wrecks are a normal, everyday occurence,  
there's no reason to do anything to davoid them. That's how they always  
work, and anyone will just have to deal with the aftermath, without  
bothering to take any steps to avoid the situation in the first place, right?


pgpNpPHajsVDw.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: security repo

2012-07-17 Thread Matthias Runge
On 17/07/12 02:40, Mike Manilone wrote:
 Hi, list
 
 I don't want too many updates so I disable the updates repo. But
 later I found that fedora repo has no updates so I couldn't get any
 security updates.

I'm not really sure, this would give you, what you really want;
especially, it may even lead to broken dependencies, because not
every package is accessible just through fedora and security channels.

Take an application and assume, there's a security flaw discovered.
It'll probably get fixed in the latest, sometimes even in some versions;
this may not include the version packaged in the distribution.
Then a packager would upgrade to a newer version, introducing newer
features, which you don't want to get. The never version may require
other packages, which are currently unavailable in fedora or security repos.

If you'd like to get security fixes backported, you'll probably want a
supported (i.e. paid) distro, e.g. RHEL or it's free clones Scientific
Linux, or CentOS.

Please note: you will still get (many) updates and should install them
all, but you won't get newer features.

I'm skeptic, if a pure security repo for fedora would work that well.
-- 
Matthias Runge mru...@matthias-runge.de
   mru...@fedoraproject.org


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Tomasz Torcz
On Tue, Jul 17, 2012 at 07:01:23AM -0400, Sam Varshavchik wrote:
 Andrew Haley writes:
 
 On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
  Jan Kratochvil writes:
 
  On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
  And I wouldn't be so presumptions as to state authoritatively what
  is or is not a bug, in something whose purpose is not known to me.
 
  Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX
 
  It is anything but normal. The normal state of things is documented by
  proc(5). As documented by that man page, rather plainly,
  readlink(/proc/self/exe) gives you your own pathname.
 
 Yes, it's the pathname that started this process.  Yes, that pathname
 may point to file that no longer exists.  That's UNIX.
 
 No, that's Linux with prelink installed.

  But pathname is volatile. That's why we support security framework based
on labels, not on pathnames...


-- 
Tomasz TorczOnly gods can safely risk perfection,
xmpp: zdzich...@chrome.pl it's a dangerous thing for a man.  -- Alia

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Bryn M. Reeves writes:


On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
 Jan Kratochvil writes:

 On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
 And I wouldn't be so presumptions as to state authoritatively what
 is or is not a bug, in something whose purpose is not known to me.

 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX

 It is anything but normal. The normal state of things is documented by
 proc(5). As documented by that man page, rather plainly,
 readlink(/proc/self/exe) gives you your own pathname. That's the normal
 state of things, if normal means anything. When that no longer holds  
true,

 that's not normal.

As others have pointed out it is a normal situation that the system has
to deal with;


No, I'm afraid it's not normal, by any sense of the word, for something to  
randomly delete executables, and replace them with similarly looking files.



  there's no escaping it on a UNIX-like OS and a developer


Yes, there's certainly a guaranteed way to escape it. It's called don't  
do stupid things. What a novel concept.



can never depend on it not happening at random times.

The pathname that is returned to readlink(2) doesn't exist in the file
system (how could it?) but the proc path is still valid for IO and the
inode will not be de-allocated while it is open:


Except that's not what proc(5) says. As described, reading that symlink  
should give you the executable's name. Except, in this situation, it no  
longer does. It points to a non-existent pathname. The fact that by some  
miracle of miracles an open() on a non-existent pathname manages to succeed,  
is an irrelevant sideshow.



If you're happy to accept something that's a different version of the
binary


I'm not.


   then I'm not sure why you need to read the executable (what are


When did I ever said that I needed to read the executable?


you checking in it?). If it's just an inode number match it's hard to
see what that achieves.


Just because you find it hard to see what that achieves, means only that:  
you find it hard to see.



 Broken maintenance scripts, of dubiuous benefit, that randomly rewrite
 unrelated binaries, should be fixed.

Suggest fixes. If you're doing something unusual the onus is on you to


Well, I did.



pgpQ8TZnFwmLY.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Bryn M. Reeves
On 07/17/2012 12:01 PM, Sam Varshavchik wrote:
 Andrew Haley writes:
 Yes, it's the pathname that started this process.  Yes, that pathname
 may point to file that no longer exists.  That's UNIX.
 
 No, that's Linux with prelink installed.

And a number of other common configurations for e.g. a Fedora system set
to automatically apply security updates in the background.

 Perhaps this might be a hard concept to wrap one's brain around, but there's  
 a quite a bit of difference between this is an exceptional event, and  
 that's what happens when i does, versus this is now a normal occurence  
 that, with prelink installed, and can happen to any random executable, at  
 any time.
 
 Across the pond, I believe that there's a word to describe this: rubbish.  

Throwing pejoratives around doesn't change the situation.

 How presumptious of an executable binary, that's not world-writable, to  
 expect that nobody's going to come around, suddenly, and delete it! What  
 would those kids think of next…

Prelink is not new. I think the fact that it's been in the distro for
many years without breaking other apps that are doing this
read-my-own-binary thing suggests that that is not a common idiom for
UNIX programs (that's not to say it has never caused any problems but
you seem to be questioning the entire design).

 Sure. And since gruesome car wrecks are a normal, everyday occurence,  
 there's no reason to do anything to davoid them. That's how they always  
 work, and anyone will just have to deal with the aftermath, without  
 bothering to take any steps to avoid the situation in the first place, right?

Adding more hyperbole and strawman arguments does not change the fact
that this can and does happen on Linux and UNIX environments and that
programs need to be aware of it and deal with it reasonably when it does
happen.

Ken Thompson once stated that if he wrote UNIX again he would spell
creat with an 'e' but nobody is proposing changing that today.

Regards,
Bryn.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Bryn M. Reeves writes:


On 07/17/2012 12:01 PM, Sam Varshavchik wrote:
 Andrew Haley writes:
 Yes, it's the pathname that started this process.  Yes, that pathname
 may point to file that no longer exists.  That's UNIX.

 No, that's Linux with prelink installed.

And a number of other common configurations for e.g. a Fedora system set
to automatically apply security updates in the background.


Except that those configurations have what's called pre and post RPM  
scripts, have you heard of them?  … which can be used to reset the  
application, so that it knows that it's been updated.


Is it really so difficult to see the difference, here?

If you tell me how an app can be notified that prelink is about to rewrite  
it, then this would be a comparable situation. But it's not.




pgp2A4OFxazXJ.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Tomasz Torcz writes:


On Tue, Jul 17, 2012 at 07:01:23AM -0400, Sam Varshavchik wrote:
 Andrew Haley writes:

 On 07/17/2012 12:38 AM, Sam Varshavchik wrote:
  Jan Kratochvil writes:
 
  On Sun, 15 Jul 2012 22:42:00 +0200, Sam Varshavchik wrote:
  And I wouldn't be so presumptions as to state authoritatively what
  is or is not a bug, in something whose purpose is not known to me.
 
  Non-existing /proc/self/exe file is a normal UNIX process state so a  
UNIX

 
  It is anything but normal. The normal state of things is documented  
by

  proc(5). As documented by that man page, rather plainly,
  readlink(/proc/self/exe) gives you your own pathname.
 
 Yes, it's the pathname that started this process.  Yes, that pathname
 may point to file that no longer exists.  That's UNIX.

 No, that's Linux with prelink installed.

  But pathname is volatile. That's why we support security framework based
on labels, not on pathnames...


Indeed. Let's just get rid of ext4, and just assign various labels to blobs  
of data on the hard drive…


Pathnames. Who needs them?



pgp1tXhN29ibP.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Bryn M. Reeves
On 07/17/2012 12:42 PM, Sam Varshavchik wrote:
  … which can be used to reset the  
 application, so that it knows that it's been updated.

Because that is a common need across many packages.

Apparently being notified of a prelink is not such a common need. Even
if such a thing did exist it could not protect you from any other
modifications to the binary if it was specific to prelinking so you
would still need to handle this case to avoid bugs in your program.

Maybe you would find more acceptance for a request asking for something
like this rather than demanding the removal of something that has been
used for many years and that has good evidence for the benefits it
claims to provide?

 If you tell me how an app can be notified that prelink is about to rewrite  
 it, then this would be a comparable situation. But it's not.

Inotify?

If you care about it in your app (and since nobody else appears to have
asked for it I'd argue that's a good sign that there is not yet any
justification for a general facility like this) perhaps you should look
at inotify and register a watch for your executable's inode so that you
can take appropriate actions?

This would also deal with modifications other than prelinking.

You could even make such a thing into a library that other developers
could use to solve the same problem. If there's widespread need for the
facility I'm sure you'd soon have plenty of users and a good
justification to get it included in distributions.

That's generally how things move forward in open source.

Regards,
Bryn.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Miloslav Trmač
On Tue, Jul 17, 2012 at 1:38 AM, Sam Varshavchik mr...@courier-mta.com wrote:
 Jan Kratochvil writes:
 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX


 It is anything but normal. The normal state of things is documented by
 proc(5).
Documentation tends to be written after-the fact, and therefore is
more likely to be incorrect than the behavior, especially in corner
cases.
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Miloslav Trmač
On Tue, Jul 17, 2012 at 4:37 AM, Sam Varshavchik mr...@courier-mta.com wrote:
 Scott Schmit writes:
 And what's the pathname of a deleted file?

 My point exactly. There is none. Thanks, prelink!

Thanks, UNIX.  What is the pathname of a file with several links?
The pathnames just doesn't mean much in UNIX, and this case is _not_
particularly special.

  Even
 then, the time would be better spent changing your software to use the
 interface correctly (or use a more appropriate one) so you never have
 problems.


 Can you explain, then, the correctly approach by which an executable can
 affirm whether another pid is either running the same executable, or the
 post-prelinked version of the same executable.

The executable _doesn't_ affirm that.  This affirmation has zero
security value due to ptrace(2) (or plain mmap(2) replacing the old
executable with something different), and I can't see any non-security
purpose of this check either.  If you don't tell us what you are
_actually_ trying to do, instead of fixating on a sub-task that is
impossible or meaningless in UNIX, I'm afraid you'll stay
disappointed.

 P.P.S. And I'm still trying to process the concept of a symbolic link
 pointing to a non-existent pathname; yet an open() on that somehow succeeds,
 nevertheless. That's one a headscratcher, even though I'm told that's how
 UNIX worked for decades. You always learn something new.

Other traditional examples: /dev/std{in,out,err} (OK, these used to be
devices rather than symlinks, but that's a trivial difference),
/proc/*/fd/* in Linux.
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Mass rebuild for Fedora 18

2012-07-17 Thread Dennis Gilmore
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

it was requested in https://fedorahosted.org/rel-eng/ticket/5222 that
we do a mass rebuild for Fedora 18 for
https://fedoraproject.org/wiki/Features/DwarfCompressor and
https://fedoraproject.org/wiki/Features/MiniDebugInfo due to a mix up
in dates it was going to start on 2012-07-30 but since that only gives
a week to do the rebuild before branching for f18 on 2012-08-07 we will
be starting the mass rebuild on 2012-07-18 

This is a heads up that it will be done in a side tag and moved over
when completed. We will be running scripts to output failure stats.
please be sure to let releng know if you see any bugs in the reporting.

Dennis
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.18 (GNU/Linux)

iEYEARECAAYFAlAFXQoACgkQkSxm47BaWfeSAACgu+vUKWhm2mLYHF4Xqr0TlrkS
qB4AoJocdVao2s6eUpWS82L5HO2bUSdC
=AAjf
-END PGP SIGNATURE-
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Upstream Release Monitoring status posting

2012-07-17 Thread Xose Vazquez Perez

On 07/16/2012 07:38 PM, Till Maas wrote:


I was asked to send to send the status of the last run of the Upstream
Release Monitoring tool to this list. It would consist of all lines in
http://till.fedorapeople.org/tmp/cnucnu-last.log
that mention that a package is outdated. Would you welcome this or find
it disturbing?

I think it would be too noisy, because currently it will contain about
500 packages where some are bogus.


I don't think it's more annoying than daily 'Rawhide Reports'.
e.g.: http://lists.fedoraproject.org/pipermail/devel/2012-July/169869.html
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Chris Adams
Once upon a time, Sam Varshavchik mr...@courier-mta.com said:
 Well, SCM_RIGHTS/SCM_CREDENTIALS is how you get the peer's pid in the first 
 place.
 
 This would be an additional check, on top of that.

Is there any value in this additional check (that nobody else
apparently does)?  Do you not trust the kernel's credential handling?
-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: security repo

2012-07-17 Thread Reindl Harald


Am 17.07.2012 02:40, schrieb Mike Manilone:
 Hi, list
 
 I don't want too many updates so I disable the updates repo. But later
 I found that fedora repo has no updates so I couldn't get any security
 updates.
 
 I think we can create a new repo called security like Debian. Push all
 the security updates to it. I believe that there are people like me
 disabled updates repo. They are very dangerous!
 
 Please review whether this is okay. Thanks!

no need

yum update --security



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Self Introduction

2012-07-17 Thread Lukas Berk
Hey list,

I've been a contributor to upstream systemtap since mid 2010 and have
been a Fedora user since Fedora 12.  Prior to joining Red Hat full
time, I participated in their internship program while completing a
computer engineering degree at Queens University.  I'd like to become a
packager for systemtap so I can help the current maintainers with
backport/fixes and releases as needed.  You can find me on #fedora-devel
and #systemtap as lberk, feel free to ping me if you have any questions.

Thanks,

Lukas


pgpWG84uJSFM0.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Fedora 18 Feature Submission Deadline in one week (2012-07-24)

2012-07-17 Thread Jaroslav Reznik
Hi!
This a friendly reminder that The Fedora 18 Feature Submission 
Deadline is coming soon (maybe too soon for some of you;-) - see
the Fedora 18 Schedule [1] - and it's exactly in one week,
on Tuesday, July 24, 2012. After this date newly submitted 
features will be targeted for Fedora 19 unless an exception 
is granted by FESCo. So, think about the stuff you're working on
if it deserves the broader visibility within the release and
submit it as a feature, see Feature process Policy [2]. 

Feature Freeze follows in other next two weeks (2012-08-07) and
Features should be *substantially complete and in a testable state*
at this point [3].

Please take a look on accepted Fedora 18 Features so far to
check what's going to happen in Spherical Cow, if there are no
conflicts with your features or you have a cool idea how to extend/
help with the features itself.

Also - for the owners of already accepted features - please update
the current status of your feature (both completion percentage and
last updated date). I'll go through the list in a next few days to 
update the main FeatureList page. After that time I can't promise 
you a friendly reminder but...

Thanks for all for the amazing job!
Jaroslav
Your Feature Wrangler

[1] http://fedoraproject.org/wiki/Releases/18/Schedule 
[2] http://fedoraproject.org/wiki/Features/Policy
[3] http://fedoraproject.org/wiki/ReleaseEngineering/FeatureFreezePolicy
[4] http://fedoraproject.org/wiki/Releases/18/FeatureList

Btw. in case you'll need a help with Feature, feel free to contact
me (email, ping etc.).

___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Fwd: Package review requests related with pdfmod

2012-07-17 Thread Ismael Olea
Hi:

pdfmod is just one package of distance to get into F18 since the two
dependencies are now approved.

Someone want to review it?

-- Forwarded message --
From: Ismael Olea ism...@olea.org
Date: Tue, Jul 3, 2012 at 1:16 PM
Subject: Package review requests related with pdfmod
To: Development discussions related to Fedora devel@lists.fedoraproject.org





-- Forwarded message --
From: Ismael Olea ism...@olea.org
Date: Fri, Jun 22, 2012 at 1:31 PM
Subject: Package review requests
To: Fedora-Mono m...@lists.fedoraproject.org



Hi:

I adopted this packages and need the peer reviews:

   - pdfmod: https://bugzilla.redhat.com/show_bug.cgi?id=834552
   - poppler-sharp https://bugzilla.redhat.com/show_bug.cgi?id=834551 (dep
   for pdfmod)
   - hyena https://bugzilla.redhat.com/show_bug.cgi?id=834548 (dep for
   pdfmod and banshee)


Volunteers?

-- 

Ismael Olea

http://olea.org/diario/



-- 

Ismael Olea

http://olea.org/diario/



-- 

Ismael Olea

http://olea.org/diario/
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[ACTION REQUIRED v2] Retiring packages for Fedora 18

2012-07-17 Thread Bill Nottingham
Before we branch for Fedora 18, as is custom, we will block currently
orphaned packages and packages that have failed to build since Fedora 16.

The following packages are currently orphaned, or fail to build. If
you have a need for one of these packages, please pick them up.
If no one claims any of these packages, they will be blocked before
we branch for Fedora 18. That is currently scheduled to happen on
or around August 7th.

Note that if you're receiving this mail directly, it's because you are
a co-maintainer of one of these packages. Please work with your
comaintainers to take up maintenance.

Package asylum (orphan)
Package cmucl (orphan)
comaintained by: green
Package debmirror (orphan)
Package drupal6-video (orphan)
Package eclipse-m2m-qvtoml (fails to build)
Package emacs-common-proofgeneral (fails to build)
Package fillmore-lombard (fails to build)
comaintained by: salimma
Package gant (fails to build)
Package gnokii (orphan)
comaintained by: hadess snirkel
Package gnome-phone-manager (orphan)
comaintained by: hadess snirkel
Package gpsdrive (orphan)
Package gtkmm-utils (orphan)
Package hardinfo (fails to build)
Package healpix (fails to build)
Package hexter-dssi (orphan)
comaintained by: oget
Package json (orphan)
Package k12linux-quick-start-guide (orphan)
Package kadu (fails to build)
comaintained by: gajownik radekl
Package libcrystalhd (fails to build)
comaintained by: kwizart
Package libfwbuilder (orphan)
Package libhid (fails to build)
Package libqttracker (fails to build)
comaintained by: jreznik
Package libsoup22 (orphan)
Package natus (fails to build)
Package ncpfs (orphan)
Package ntfs-config (fails to build)
Package perl-Nagios-Plugin-Beanstalk (orphan)
Package pfqueue (orphan)
Package pino (fails to build)
Package polyester (orphan)
Package polyester3 (orphan)
Package python-batchhttp (orphan)
Package python-pywt (fails to build)
Package python-remoteobjects (orphan)
Package python-typepad (orphan)
Package qtparted (fails to build)
Package selenium-remote-control (fails to build)
Package torque (orphan)
Package typepad-motion (orphan)
Package upstart (orphan)
Package whatsup (orphan)

List of deps left behind by packages which are orphaned or fail to build:

Removing: emacs-common-proofgeneral
coq requires xemacs-proofgeneral = 3.7.1-5.fc15
coq requires emacs-proofgeneral = 3.7.1-5.fc15
coq-emacs requires emacs-proofgeneral = 3.7.1-5.fc15
coq-xemacs requires xemacs-proofgeneral = 3.7.1-5.fc15

Removing: gnokii
libopensync-plugin-gnokii requires libgnokii.so.7
libopensync-plugin-gnokii requires gnokii-devel = 0.6.31-1.fc18

Removing: healpix
skyviewer requires chealpix-devel = 2.13a-2.fc14
skyviewer requires libchealpix.so

Removing: libfwbuilder
fwbuilder requires libfwcompiler.so.9
fwbuilder requires libfwbuilder-devel = 4.1.2-1.fc15
fwbuilder requires libfwbuilder.so.9
fwbuilder requires libfwbuilder = 4.1.2-1.fc15
fwbuilder-cisco requires libfwcompiler.so.9
fwbuilder-cisco requires libfwbuilder.so.9
fwbuilder-ipf requires libfwcompiler.so.9
fwbuilder-ipf requires libfwbuilder.so.9
fwbuilder-ipfw requires libfwcompiler.so.9
fwbuilder-ipfw requires libfwbuilder.so.9
fwbuilder-ipt requires libfwcompiler.so.9
fwbuilder-ipt requires libfwbuilder.so.9
fwbuilder-pf requires libfwcompiler.so.9
fwbuilder-pf requires libfwbuilder.so.9
fwbuilder-procurve requires libfwcompiler.so.9
fwbuilder-procurve requires libfwbuilder.so.9

Removing: libsoup22
libopensync-plugin-syncml requires libsoup22-devel = 2.2.105-9.fc15
libsyncml requires libsoup-2.2.so.8
libsyncml requires libsoup22-devel = 2.2.105-9.fc15

Removing: ncpfs
hydra requires ncpfs-devel = 2.2.6-16.fc17
hydra requires libncp.so.2.3
hydra requires libncp.so.2.3(NCPFS.2.2.0.17)
hydra requires libncp.so.2.3(NCPFS_2.2.0.19)
hydra requires libncp.so.2.3(NCPFS_2.2.1)
medusa requires ncpfs-devel = 2.2.6-16.fc17
medusa requires libncp.so.2.3
medusa requires libncp.so.2.3(NCPFS.2.2.0.17)
medusa requires libncp.so.2.3(NCPFS_2.2.0.19)
medusa requires libncp.so.2.3(NCPFS_2.2.1)

Removing: python-batchhttp
django-typepad requires python-batchhttp = 1.1-4.fc17

Removing: python-remoteobjects
django-typepad requires python-remoteobjects = 1.1-4.fc17

Removing: python-typepad
django-typepad requires python-typepad = 1.1.2-4.fc17

Removing: selenium-remote-control
perl-Alien-SeleniumRC requires selenium-server = 1.0.3-8.20100318svn.fc15

Removing: torque
pbstop requires torque-client = 3.0.4-1.fc17
perl-PBS requires libtorque.so.2
perl-PBS requires libtorque-devel = 3.0.4-1.fc17
python-pbs requires torque-devel = 3.0.4-1.fc17
python-pbs requires libtorque.so.2
python3-pbs requires libtorque.so.2

Removing: upstart
clamav-milter-upstart requires /sbin/initctl
clamav-scanner-upstart requires 

[Test-Announce] Call for Test Days for Fedora 18

2012-07-17 Thread Adam Williamson
Hey, folks. It's that time again - time to start thinking about Test
Days for Fedora 18.

For anyone who isn't aware, a Test Day is an event usually focused
around IRC for interaction and a Wiki page for instructions and results,
with the aim being to get a bunch of interested users and developers
together to test a specific feature or area of the distribution. You can
run a Test Day on just about anything for which it would be useful to do
some fairly focused testing in 'real time' with a group of testers; it
doesn't have to be code, for instance we often run Test Days for
l10n/i18n topics. For more information on Test Days, see
https://fedoraproject.org/wiki/QA/Test_Days .

Anyone who wants to can host their own Test Day, or you can request that
the QA group helps you out with organization, or any combination of the
two. To propose a Test Day, just file a ticket in QA trac - full details
are at https://fedoraproject.org/wiki/QA/Test_Days/Create . For
instructions on hosting a Test Day, see
https://fedoraproject.org/wiki/QA/SOP_Test_Day_management .

You can see the schedule at
https://fedoraproject.org/wiki/QA/Fedora_18_test_days . There are many
slots open right now, with the earliest on 2012-08-09 and the latest
2012-11-01. Consider the development schedule, though, in deciding when
you want to run your Test Day - for some topics you may want to avoid
the time before the Alpha release or the time after the feature freeze
or the Final freeze.

We normally aim to schedule Test Days on Thursdays; however, if you want
to run a series of related Test Days, it's often a good idea to do
something like Tuesday / Wednesday / Thursday of the same week (this is
how we usually run the X Test Week, for instance). If all the Thursday
slots fill up but more people want to run Test Days, we will open up
Tuesday slots as overflows. And finally, if you really want to run a
Test Day in a specific timeframe due to the development schedule, but
the Thursday slot for that week is full, we can add a slot on another
day. We're flexible! Just put in your ticket the date or timeframe you'd
like, and we'll figure it out from there.

If you have any questions about the Test Day process, please don't
hesitate to contact me or any other member of the QA team on test@ or in
#fedora-qa on IRC. Thanks!
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

___
test-announce mailing list
test-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/test-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [ACTION REQUIRED v2] Retiring packages for Fedora 18

2012-07-17 Thread Michael Schwendt
On Tue, 17 Jul 2012 13:51:24 -0400, Bill Nottingham wrote:

 Before we branch for Fedora 18, as is custom, we will block currently
 orphaned packages and packages that have failed to build since Fedora 16.
 
 The following packages are currently orphaned, or fail to build. If
 you have a need for one of these packages, please pick them up.
 If no one claims any of these packages, they will be blocked before
 we branch for Fedora 18. That is currently scheduled to happen on
 or around August 7th.

Anyone interested in

  archmage -- Extensible reader/decompiler of files in CHM format
  gnusim8085 -- A graphical simulator for Intel 8085 microprocessor
  gtick -- A graphical metronome software
  python-chm -- Python package for CHM files handling

?

Those are packages which are unmaintained since 2010, but after recent
contact with their owner they are still not orphaned:
https://fedorahosted.org/rel-eng/ticket/5237
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Upstream Release Monitoring status posting

2012-07-17 Thread Emmanuel Seyman
* Till Maas [17/07/2012 07:09] :
 
 I was asked to send to send the status of the last run of the Upstream
 Release Monitoring tool to this list. It would consist of all lines in
 http://till.fedorapeople.org/tmp/cnucnu-last.log
 that mention that a package is outdated. Would you welcome this or find
 it disturbing?

Mostly for. Anybody who doesn't care to read it can skip it or filter it
out from their mailbox. And on the plus side, making the results more
visible might incite people into sending bugfixes.

Emmanuel
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Bryn M. Reeves writes:


On 07/17/2012 12:42 PM, Sam Varshavchik wrote:
  … which can be used to reset the
 application, so that it knows that it's been updated.

Because that is a common need across many packages.

Apparently being notified of a prelink is not such a common need. Even
if such a thing did exist it could not protect you from any other
modifications to the binary if it was specific to prelinking so you
would still need to handle this case to avoid bugs in your program.


I'm having some kind of a difficulty parsing the above. How exactly would  
some kind of a notification that your executable has been prelinked would  
not be effective for modifications that result from prelinking.



Maybe you would find more acceptance for a request asking for something
like this rather than demanding the removal of something that has been
used for many years and that has good evidence for the benefits it
claims to provide?


I don't recall myself demanding anything. I described a problem that prelink  
is causing, namely invalidation of the contents of the /proc/self/exe  
symlink. I also floated some alternatives, like skipping binaries that are  
currently running.


I see little sense in demanding something that can already be easily done  
anyway, like removing prelink altogether, or by blacklisting a selected  
executable, which is trivial to implement. I just thought – and as I said,  
that this is not solving the problem, but sweeping it under the rug, and  
that there should be a better way to avoid having prelink break  
/proc/self/exe.




 If you tell me how an app can be notified that prelink is about to rewrite
 it, then this would be a comparable situation. But it's not.

Inotify?

If you care about it in your app (and since nobody else appears to have
asked for it I'd argue that's a good sign that there is not yet any
justification for a general facility like this) perhaps you should look
at inotify and register a watch for your executable's inode so that you
can take appropriate actions?

This would also deal with modifications other than prelinking.


I'm dying to know what other modifications are there, other than  
prelinking – inquiring mind wants to know. And the coin can be flipped both  
ways too: AFAIK nothing else other than prelink randomly scribbles over  
random executables. Somehow, things have been fine all along, before prelink  
came along, and perhaps, some consideration could've been provided for  
applications to use and integrate with.



You could even make such a thing into a library that other developers
could use to solve the same problem. If there's widespread need for the
facility I'm sure you'd soon have plenty of users and a good
justification to get it included in distributions.

That's generally how things move forward in open source.


Thank you for telling me what I've already done. But, it would've been great  
to avoid dealing with prelink's broken design in the first place.




pgpPZzmDwKd57.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Miloslav Trmač writes:

On Tue, Jul 17, 2012 at 1:38 AM, Sam Varshavchik mr...@courier-mta.com  
wrote:

 Jan Kratochvil writes:
 Non-existing /proc/self/exe file is a normal UNIX process state so a UNIX


 It is anything but normal. The normal state of things is documented by
 proc(5).
Documentation tends to be written after-the fact, and therefore is
more likely to be incorrect than the behavior, especially in corner
cases.


Ok. I guess it's time to remove the man-pages rpm from Fedora. It's useless,  
from the looks of things.




pgpM4XsYf1Rdm.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Miloslav Trmač writes:

On Tue, Jul 17, 2012 at 4:37 AM, Sam Varshavchik mr...@courier-mta.com  
wrote:

 Scott Schmit writes:
 And what's the pathname of a deleted file?

 My point exactly. There is none. Thanks, prelink!

Thanks, UNIX.  What is the pathname of a file with several links?


Doesn't matter, either one of them is fine.


The pathnames just doesn't mean much in UNIX, and this case is _not_
particularly special.


Yes, let's get rid of filesystems, and store everything in a relational  
database. Isn't that something that a convicted monopolist tried to do, the  
other day?




 Can you explain, then, the correctly approach by which an executable can
 affirm whether another pid is either running the same executable, or the
 post-prelinked version of the same executable.

The executable _doesn't_ affirm that.  This affirmation has zero
security value due to ptrace(2) (or plain mmap(2) replacing the old
executable with something different), and I can't see any non-security
purpose of this check either.


Just because that you see zero value of this, and that you see no purpose  
from it, doesn't mean that there is none.



 If you don't tell us what you are
_actually_ trying to do, instead of fixating on a sub-task that is
impossible or meaningless in UNIX, I'm afraid you'll stay
disappointed.


I already described what I'm doing, but I don't really feel like listening  
again to someone who firmly believes that they know what I'm doing better  
than me.



 P.P.S. And I'm still trying to process the concept of a symbolic link
 pointing to a non-existent pathname; yet an open() on that somehow  
succeeds,

 nevertheless. That's one a headscratcher, even though I'm told that's how
 UNIX worked for decades. You always learn something new.

Other traditional examples: /dev/std{in,out,err} (OK, these used to be
devices rather than symlinks, but that's a trivial difference),


Really? An example of a symbolic link pointing to a non-existent pathname?

lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stderr → /proc/self/fd/2
lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stdin → /proc/self/fd/0
lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stdout → /proc/self/fd/1

You mean to tell me that none of those symlinks exist? Could've fooled me:

[mrsam@eee900 /]$ ls -al /proc/self/fd/{0,1,2}
lrwx--. 1 mrsam mrsam 64 Jul 17 18:31 /proc/self/fd/0 → /dev/pts/1
lrwx--. 1 mrsam mrsam 64 Jul 17 18:31 /proc/self/fd/1 → /dev/pts/1
lrwx--. 1 mrsam mrsam 64 Jul 17 18:31 /proc/self/fd/2 → /dev/pts/1

But they do!

crw--w. 1 mrsam tty 136, 1 Jul 17 18:31 /dev/pts/1

And that symlink exists as well! And I can even open it!

[mrsam@eee900 /]$ cat /dev/pts/1

Wow, what a novel concept.

So, can you try again, with an example of a symlink that points to a non- 
existent pathname, yet one that can be open(), like /proc/self/exe →  
$filename (deleted) can.


But, again, that's a sideshow and a distraction. That's not a problem, or an  
issue, of course. The problem is prelink invalidating the symlink, with the  
sorry excuses from the duh… but you can still open it crowd, who are  
incapable of understanding what the issue is.




pgpZVYWUYO4pc.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Chris Adams writes:


Once upon a time, Sam Varshavchik mr...@courier-mta.com said:
 Well, SCM_RIGHTS/SCM_CREDENTIALS is how you get the peer's pid in the first
 place.

 This would be an additional check, on top of that.

Is there any value in this additional check (that nobody else
apparently does)?  Do you not trust the kernel's credential handling?


I certainly trust it. But just because I trust it, it doesn't mean that any  
additional checks have no value.


pgpw55pZAHfbD.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [ACTION REQUIRED v2] Retiring packages for Fedora 18

2012-07-17 Thread Patrick Uiterwijk
 Anyone interested in

   gnusim8085 -- A graphical simulator for Intel 8085 microprocessor

I would be interested in taking gnusim8085.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Chris Adams
Once upon a time, Sam Varshavchik mr...@courier-mta.com said:
 Chris Adams writes:
 Is there any value in this additional check (that nobody else
 apparently does)?  Do you not trust the kernel's credential handling?
 
 I certainly trust it. But just because I trust it, it doesn't mean that any 
 additional checks have no value.

Sure it does.  If the credentials are always correct, additional checks
past that are a waste of cycles.  I ask again: do you have a legitimate
use case?  Is there _any_ case that other checks can succeed that this
invented test of yours would catch?
-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Miloslav Trmač writes:

On Wed, Jul 18, 2012 at 12:35 AM, Sam Varshavchik mr...@courier-mta.com  
wrote:

 Miloslav Trmač writes:
  Can you explain, then, the correctly approach by which an executable  
can

  affirm whether another pid is either running the same executable, or the
  post-prelinked version of the same executable.

 The executable _doesn't_ affirm that.  This affirmation has zero
 security value due to ptrace(2) (or plain mmap(2) replacing the old
 executable with something different), and I can't see any non-security
 purpose of this check either.

 Just because that you see zero value of this, and that you see no purpose
 from it, doesn't mean that there is none.

I have explained why I think the information is meaningless.  Which
part is incorrect, or what am I assuming that is not true?


Yes, you have explained why you think it's meaningless. And I explained why  
I think it's not.



  P.P.S. And I'm still trying to process the concept of a symbolic link
  pointing to a non-existent pathname; yet an open() on that somehow  
succeeds,
  nevertheless. That's one a headscratcher, even though I'm told that's  
how

  UNIX worked for decades. You always learn something new.

 Other traditional examples: /dev/std{in,out,err} (OK, these used to be
 devices rather than symlinks, but that's a trivial difference),
 Really? An example of a symbolic link pointing to a non-existent  
pathname?


 lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stderr → /proc/self/fd/2
 lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stdin → /proc/self/fd/0
 lrwxrwxrwx. 1 root root 15 Jul 17 18:02 /dev/stdout → /proc/self/fd/1

Traditionally, /dev/std* were special devices, not special links to


Who said anything about the type of the file they pointed to? You must've  
meant to reply to some other post. I made no reference to the file type that  
was targeted by the symbolic link.




pgpEmHNRIKveW.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: prelink should not mess with running executables

2012-07-17 Thread Sam Varshavchik

Chris Adams writes:


Once upon a time, Sam Varshavchik mr...@courier-mta.com said:
 Chris Adams writes:
 Is there any value in this additional check (that nobody else
 apparently does)?  Do you not trust the kernel's credential handling?

 I certainly trust it. But just because I trust it, it doesn't mean that any
 additional checks have no value.

Sure it does.  If the credentials are always correct, additional checks
past that are a waste of cycles.


You feel absolutely confident that just because you can't think of any value  
of additional checks, there cannot possibly be any.


You're wrong.


 I ask again: do you have a legitimate
use case?  Is there _any_ case that other checks can succeed that this
invented test of yours would catch?


I already explained what they are. You may think you can always use ptrace,  
but ptrace cannot be used in every case. Furthermore, even if ptrace can,  
somehow, be used, that does not invalidate the value of the check.


It's the same reason why the bind-chroot package exists (setting aside for  
the moment the completely irrelevant side issue that bind-chroot in F17  
never worked, because apparently nobody bothered to actually execute  
systemctl start named-chroot.service and see if dig www.yahoo.com works  
afterwards, after fscking around with its systemd.unit file, or even read  
the months-old bugzilla report documenting the breakage, and what needs to  
be done to fix it). Putting bind in a chroot jail offers no apparent benefit  
or value, according to this same kind of logic. Yet, clearly it has value,  
even though it's impossible for some to see it.




pgpZw7wIXT8qa.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [ACTION REQUIRED v2] Retiring packages for Fedora 18

2012-07-17 Thread Brendan Jones

On 07/17/2012 10:19 PM, Michael Schwendt wrote:

   gtick -- A graphical metronome software


I have added myself to this package.

regards

Brendan
(bsjones)
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[Bug 746941] perl-Mojolicious-3.10 is available

2012-07-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=746941

--- Comment #69 from Upstream Release Monitoring 
upstream-release-monitor...@fedoraproject.org ---
Latest upstream release: 3.10
Current version in Fedora Rawhide: 3.07
URL: http://search.cpan.org/dist/Mojolicious/

Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy

More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 746941] perl-Mojolicious-3.10 is available

2012-07-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=746941

Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org 
changed:

   What|Removed |Added

Summary|perl-Mojolicious-3.08 is|perl-Mojolicious-3.10 is
   |available   |available

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

File Role-Tiny-1.001004.tar.gz uploaded to lookaside cache by iarnell

2012-07-17 Thread Iain Arnell
A file has been added to the lookaside cache for perl-Role-Tiny:

cdee4d5f88088507eb69c77ae5c341ed  Role-Tiny-1.001004.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-HTML-Tree] Tidy up and don't BR: perl(Test::LeakTrace) when bootstrapping

2012-07-17 Thread Paul Howarth
commit 486f38bd831508b77f5d764f2d00311892090f8a
Author: Paul Howarth p...@city-fan.org
Date:   Tue Jul 17 12:27:24 2012 +0100

Tidy up and don't BR: perl(Test::LeakTrace) when bootstrapping

- Don't BR: perl(Test::LeakTrace) when bootstrapping
- Don't use macros for commands
- Don't need to remove empty directories from the buildroot
- Drop explicit provides for perl(HTML::Tree) now that CPAN and RPM versions
  are back in sync

 perl-HTML-Tree.spec |   29 +
 1 files changed, 17 insertions(+), 12 deletions(-)
---
diff --git a/perl-HTML-Tree.spec b/perl-HTML-Tree.spec
index f6943ca..6848619 100644
--- a/perl-HTML-Tree.spec
+++ b/perl-HTML-Tree.spec
@@ -1,7 +1,7 @@
 Name:   perl-HTML-Tree
-Version:5.02
-Release:3%{?dist}
 Epoch:  1
+Version:5.02
+Release:4%{?dist}
 Summary:HTML tree handling modules for Perl
 Group:  Development/Libraries
 License:GPL+ or Artistic
@@ -15,16 +15,16 @@ BuildRequires:  perl(Module::Build)
 BuildRequires:  perl(Test::Exception)
 BuildRequires:  perl(Test::Pod) = 1.00
 BuildRequires:  perl(Test::More)
-BuildRequires: perl(Test::Fatal)
-BuildRequires: perl(Test::LeakTrace)
+BuildRequires:  perl(Test::Fatal)
 %if !%{defined perl_bootstrap}
-BuildRequires: perl(HTML::FormatText)
+# HTML::FormatText (perl-HTML-Format) has BR: perl(HTML::TreeBuilder) from 
this package
+BuildRequires:  perl(HTML::FormatText)
+# perl-Test-LeakTrace - perl-Test-Valgrind - perl-XML-Twig - perl-HTML-Tree
+BuildRequires:  perl(Test::LeakTrace)
 %endif
+Requires:   perl(:MODULE_COMPAT_%(eval `perl -V:version`; echo $version))
 Requires:   perl(HTML::Parser) = 3.46
 Requires:   perl(HTML::Tagset) = 3.02
-Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
-# add because of possible problems with not mathing cpan,rpm version
-Provides:   perl(HTML::Tree) = %{version}
 
 %description
 This distribution contains a suite of modules for representing,
@@ -37,14 +37,12 @@ a separate development track.
 %setup -q -n HTML-Tree-%{version}
 
 %build
-%{__perl} Build.PL installdirs=vendor
+perl Build.PL installdirs=vendor
 ./Build
 
 %install
 ./Build install destdir=$RPM_BUILD_ROOT create_packlist=0
-find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2/dev/null \;
-
-%{_fixperms} $RPM_BUILD_ROOT/*
+%{_fixperms} $RPM_BUILD_ROOT
 
 %check
 ./Build test
@@ -56,6 +54,13 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 
2/dev/null \;
 %{_mandir}/man3/HTML::*3*
 
 %changelog
+* Tue Jul 17 2012 Paul Howarth p...@city-fan.org - 1:5.02-4
+- Don't BR: perl(Test::LeakTrace) when bootstrapping
+- Don't use macros for commands
+- Don't need to remove empty directories from the buildroot
+- Drop explicit provides for perl(HTML::Tree) now that CPAN and RPM versions
+  are back in sync
+
 * Tue Jul 10 2012 Petr Pisar ppi...@redhat.com - 1:5.02-3
 - Perl 5.16 re-rebuild of bootstrapped packages
 
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Role-Tiny] update to 1.001004

2012-07-17 Thread Iain Arnell
commit dedd1cdacfea3a44bfdc6a198a2041bd7d7393f5
Author: Iain Arnell iarn...@gmail.com
Date:   Tue Jul 17 05:29:47 2012 -0600

update to 1.001004

 .gitignore  |1 +
 perl-Role-Tiny.spec |7 +--
 sources |2 +-
 3 files changed, 7 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index b72a6da..99282a0 100644
--- a/.gitignore
+++ b/.gitignore
@@ -2,3 +2,4 @@
 /Role-Tiny-1.01.tar.gz
 /Role-Tiny-1.001001.tar.gz
 /Role-Tiny-1.001002.tar.gz
+/Role-Tiny-1.001004.tar.gz
diff --git a/perl-Role-Tiny.spec b/perl-Role-Tiny.spec
index 059bf40..98fc65a 100644
--- a/perl-Role-Tiny.spec
+++ b/perl-Role-Tiny.spec
@@ -1,6 +1,6 @@
 Name:   perl-Role-Tiny
-Version:1.001002
-Release:2%{?dist}
+Version:1.001004
+Release:1%{?dist}
 Summary:A nouvelle cuisine portion size slice of Moose
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -46,6 +46,9 @@ make test
 %{_mandir}/man3/*
 
 %changelog
+* Tue Jul 17 2012 Iain Arnell iarn...@gmail.com 1.001004-1
+- update to latest upstream version
+
 * Fri Jun 22 2012 Petr Pisar ppi...@redhat.com - 1.001002-2
 - Perl 5.16 rebuild
 
diff --git a/sources b/sources
index 6fe96e1..23bcf95 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-c8dc627418d0e3360e3ab35c120987d1  Role-Tiny-1.001002.tar.gz
+cdee4d5f88088507eb69c77ae5c341ed  Role-Tiny-1.001004.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 480129] Error at calling service amavisd restart when SELinux is in enforce mode

2012-07-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=480129

Milos Malik mma...@redhat.com changed:

   What|Removed |Added

 Status|ON_QA   |VERIFIED

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Role-Tiny/f17] (5 commits) ...update to 1.001004

2012-07-17 Thread Iain Arnell
Summary of changes:

  9a479ec... update to 1.01 (*)
  1019d3e... update to 1.001001 (*)
  fa7aa62... update to 1.001002 (*)
  9764fa2... Perl 5.16 rebuild (*)
  dedd1cd... update to 1.001004 (*)

(*) This commit already existed in another branch; no separate mail sent
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-HTML-Tree] Created tag perl-HTML-Tree-5.02-4.fc18

2012-07-17 Thread Paul Howarth
The lightweight tag 'perl-HTML-Tree-5.02-4.fc18' was created pointing to:

 486f38b... Tidy up and don't BR: perl(Test::LeakTrace) when bootstrapp
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-YAML] Tidy up and fix build dependency loop

2012-07-17 Thread Paul Howarth
commit b92f5aef9e337e5e8a5bbb04b9b47cc282ee7669
Author: Paul Howarth p...@city-fan.org
Date:   Tue Jul 17 12:54:40 2012 +0100

Tidy up and fix build dependency loop

- Haven't needed to fix documentation character encoding since 0.79
- Drop Test::Base build dependency again to avoid a BR loop (#215637)
- Filter private provides perl(yaml_mapping), perl(yaml_scalar) and
  perl(yaml_sequence)
- Don't need to remove empty directories from the buildroot
- This release by MSTROUT - update source URL

 perl-YAML.spec |   28 +---
 1 files changed, 17 insertions(+), 11 deletions(-)
---
diff --git a/perl-YAML.spec b/perl-YAML.spec
index a7c0dd5..ab60b62 100644
--- a/perl-YAML.spec
+++ b/perl-YAML.spec
@@ -1,11 +1,11 @@
 Name:   perl-YAML
 Version:0.84
-Release:1%{?dist}
+Release:2%{?dist}
 Summary:YAML Ain't Markup Language (tm)
 License:GPL+ or Artistic
 Group:  Development/Libraries
 URL:http://search.cpan.org/dist/YAML/
-Source0:
http://search.cpan.org/CPAN/authors/id/I/IN/INGY/YAML-%{version}.tar.gz
+Source0:
http://search.cpan.org/CPAN/authors/id/M/MS/MSTROUT/YAML-%{version}.tar.gz
 BuildArch:  noarch
 BuildRequires:  perl(Carp)
 BuildRequires:  perl(constant)
@@ -13,12 +13,14 @@ BuildRequires:  perl(Data::Dumper)
 BuildRequires:  perl(Exporter)
 BuildRequires:  perl(ExtUtils::MakeMaker)
 BuildRequires:  perl(lib)
-BuildRequires:  perl(Test::Base)
-BuildRequires:  perl(Test::Base::Filter)
 Requires:   perl(:MODULE_COMPAT_%(eval `perl -V:version`; echo $version))
 Requires:   perl(Carp)
 Requires:   perl(Data::Dumper)
 
+# Filter private provides:
+# perl(yaml_mapping) perl(yaml_scalar) perl(yaml_sequence)
+%global __provides_exclude ^perl\\(yaml_
+
 %description
 The YAML.pm module implements a YAML Loader and Dumper based on the
 YAML 1.0 specification. http://www.yaml.org/spec/
@@ -31,24 +33,20 @@ specification.
 %prep
 %setup -q -n YAML-%{version}
 
-# Re-code docs as UTF-8
-iconv -f iso-8859-1 -t utf8  README  README.utf8
-mv README.utf8 README
-
 %build
 perl Makefile.PL INSTALLDIRS=vendor  /dev/null
 make %{?_smp_mflags}
 
 %install
 make pure_install DESTDIR=%{buildroot}
+find %{buildroot} -type f -name .packlist -exec rm -f {} \;
+%{_fixperms} %{buildroot}
+
 # Removing Test::YAML (at least temporarily) due
 # to security concerns and questionable value.
 # https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197539
 rm -f %{buildroot}%{perl_vendorlib}/Test/YAML* \
 %{buildroot}%{_mandir}/man3/Test::YAML*.3*
-find %{buildroot} -type f -name .packlist -exec rm -f {} \;
-find %{buildroot} -depth -type d -exec rmdir {} 2/dev/null \;
-%{_fixperms} %{buildroot}/*
 
 %check
 make test
@@ -59,6 +57,14 @@ make test
 %{_mandir}/man3/YAML*.3*
 
 %changelog
+* Tue Jul 17 2012 Paul Howarth p...@city-fan.org - 0.84-2
+- Haven't needed to fix documentation character encoding since 0.79
+- Drop Test::Base build dependency again to avoid a BR loop (#215637)
+- Filter private provides perl(yaml_mapping), perl(yaml_scalar) and
+  perl(yaml_sequence)
+- Don't need to remove empty directories from the buildroot
+- This release by MSTROUT - update source URL
+
 * Mon Jul 16 2012 Petr Šabata con...@redhat.com - 0.84-1
 - 0.84 bump
 - Drop command macros
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-YAML] Created tag perl-YAML-0.84-2.fc18

2012-07-17 Thread Paul Howarth
The lightweight tag 'perl-YAML-0.84-2.fc18' was created pointing to:

 b92f5ae... Tidy up and fix build dependency loop
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-PDL

2012-07-17 Thread buildsys


perl-PDL has broken dependencies in the rawhide tree:
On x86_64:
perl-PDL-2.4.10-1.fc17.x86_64 requires perl(:MODULE_COMPAT_5.14.2)
On i386:
perl-PDL-2.4.10-1.fc17.i686 requires perl(:MODULE_COMPAT_5.14.2)
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-Unix-Statgrab

2012-07-17 Thread buildsys


perl-Unix-Statgrab has broken dependencies in the rawhide tree:
On x86_64:
perl-Unix-Statgrab-0.04-13.fc17.x86_64 requires 
perl(:MODULE_COMPAT_5.14.2)
On i386:
perl-Unix-Statgrab-0.04-13.fc17.i686 requires 
perl(:MODULE_COMPAT_5.14.2)
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-eperl

2012-07-17 Thread buildsys


perl-eperl has broken dependencies in the rawhide tree:
On x86_64:
perl-eperl-2.2.14-19.fc17.x86_64 requires perl(:MODULE_COMPAT_5.14.2)
On i386:
perl-eperl-2.2.14-19.fc17.i686 requires perl(:MODULE_COMPAT_5.14.2)
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-Class-InsideOut

2012-07-17 Thread buildsys


perl-Class-InsideOut has broken dependencies in the rawhide tree:
On x86_64:
perl-Class-InsideOut-1.10-6.fc17.noarch requires 
perl(:MODULE_COMPAT_5.14.2)
On i386:
perl-Class-InsideOut-1.10-6.fc17.noarch requires 
perl(:MODULE_COMPAT_5.14.2)
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[Bug 839742] Review Request: perl-Rose-Object - Simple object base class

2012-07-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=839742

Jitka Plesnikova jples...@redhat.com changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 CC||jples...@redhat.com
   Assignee|nob...@fedoraproject.org|jples...@redhat.com
  Flags||fedora-review?

--- Comment #3 from Jitka Plesnikova jples...@redhat.com ---
Package Review
==

Key:
- = N/A
x = Pass
! = Fail
? = Not evaluated



 Generic 
[x]: EXTRA Rpmlint is run on all installed packages.
 Note: There are rpmlint messages (see attachment).
[x]: EXTRA Spec file according to URL is the same as in SRPM.
[x]: MUST Package is licensed with an open-source compatible license and meets
 other legal requirements as defined in the legal section of Packaging
 Guidelines.
[x]: MUST Package successfully compiles and builds into binary rpms on at
 least one supported primary architecture.
[x]: MUST %build honors applicable compiler flags or justifies otherwise.
[x]: MUST All build dependencies are listed in BuildRequires, except for any
 that are listed in the exceptions section of Packaging Guidelines.
[x]: MUST Buildroot is not present
 Note: Unless packager wants to package for EPEL5 this is fine
[x]: MUST Package contains no bundled libraries.
[x]: MUST Changelog in prescribed format.
[x]: MUST Package has no %clean section with rm -rf %{buildroot} (or
 $RPM_BUILD_ROOT)
 Note: Clean would be needed if support for EPEL is required
[x]: MUST Sources contain only permissible code or content.
[x]: MUST Each %files section contains %defattr if rpm  4.4
 Note: Note: defattr macros not found. They would be needed for EPEL5
[x]: MUST Macros in Summary, %description expandable at SRPM build time.
[-]: MUST Package contains desktop file if it is a GUI application.
[-]: MUST Development files must be in a -devel package
[x]: MUST Package requires other packages for directories it uses.
[x]: MUST Package uses nothing in %doc for runtime.
[x]: MUST Package is not known to require ExcludeArch.
[x]: MUST Permissions on files are set properly.
[x]: MUST Package does not contain duplicates in %files.
[x]: MUST Package complies to the Packaging Guidelines
[x]: MUST Spec file lacks Packager, Vendor, PreReq tags.
[x]: MUST Package does not run rm -rf %{buildroot} (or $RPM_BUILD_ROOT) at the
 beginning of %install.
 Note: rm -rf would be needed if support for EPEL5 is required
[-]: MUST Large documentation files are in a -doc subpackage, if required.
[-]: MUST If (and only if) the source package includes the text of the
 license(s) in its own file, then that file, containing the text of the
 license(s) for the package is included in %doc.
[x]: MUST License field in the package spec file matches the actual license.
[x]: MUST Package consistently uses macro is (instead of hard-coded directory
 names).
[x]: MUST Package is named using only allowed ascii characters.
[x]: MUST Package is named according to the Package Naming Guidelines.
[x]: MUST Package does not generate any conflict.
[x]: MUST Package obeys FHS, except libexecdir and /usr/target.
[x]: MUST Package must own all directories that it creates.
[x]: MUST Package does not own files or directories owned by other packages.
[x]: MUST Package installs properly.
[x]: MUST Package is not relocatable.
[!]: MUST Requires correct, justified where necessary.
[x]: MUST Rpmlint is run on all rpms the build produces.
 Note: No rpmlint messages.
[x]: MUST Sources used to build the package match the upstream source, as
 provided in the spec URL.
[x]: MUST Spec file is legible and written in American English.
[x]: MUST Spec file name must match the spec package %{name}, in the format
 %{name}.spec.
[-]: MUST Package contains systemd file(s) if in need.
[x]: MUST File names are valid UTF-8.
[x]: SHOULD Reviewer should test that the package builds in mock.
[-]: SHOULD If the source package does not include license text(s) as a
 separate file from upstream, the packager SHOULD query upstream to
 include it.
[x]: SHOULD Dist tag is present.
[x]: SHOULD No file requires outside of /etc, /bin, /sbin, /usr/bin,
 /usr/sbin.
[!]: SHOULD Final provides and requires are sane (rpm -q --provides and rpm -q
 --requires).
[?]: SHOULD Package functions as described.
[x]: SHOULD Latest version is packaged.
[x]: SHOULD Package does not include license text files separate from
 upstream.
[x]: SHOULD SourceX / PatchY prefixed with %{name}.
[x]: SHOULD SourceX is a working URL.
[-]: SHOULD Description and summary sections in the package spec file contains
 translations for supported Non-English languages, if available.
[x]: SHOULD Package should compile and build into binary rpms on all supported
 architectures.

[Bug 839742] Review Request: perl-Rose-Object - Simple object base class

2012-07-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=839742

--- Comment #4 from Bill Pemberton wf...@virginia.edu ---
Rose::Object::MakeMethods was originally filtered from requires because it
would create a circular depandancy.  This was quite a few rpm versions ago
(I've used essentially these same specs locally for years).  It appears not to
cause a problem now, so I've removed it.

I'd like leave Class:XSAccessor out of the requires.  It's optional for
Rose::Object and would prevent Rose::Object from being in epel6 since
Class:XSAccessor is not in epel6.

Also, could you tell me how you are generating the missing requires?  I'd like
to know so I can catch these ahead of time.

Spec URL: http://wfp.fedorapeople.org/perl-Rose-Object.spec
SRPM URL: http://wfp.fedorapeople.org/perl-Rose-Object-0.859-5.fc17.src.rpm

-- 
You are receiving this mail because:
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

File Moo-0.091014.tar.gz uploaded to lookaside cache by iarnell

2012-07-17 Thread Iain Arnell
A file has been added to the lookaside cache for perl-Moo:

100937be2395297989026780454d9fee  Moo-0.091014.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[perl-Moo] update to 0.091014

2012-07-17 Thread Iain Arnell
commit d7aeebdb99258347c5dfb8993c4bdac073906881
Author: Iain Arnell iarn...@gmail.com
Date:   Tue Jul 17 17:41:45 2012 -0600

update to 0.091014

 .gitignore|1 +
 perl-Moo.spec |9 ++---
 sources   |2 +-
 3 files changed, 8 insertions(+), 4 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 1735201..d974b51 100644
--- a/.gitignore
+++ b/.gitignore
@@ -4,3 +4,4 @@
 /Moo-0.009013.tar.gz
 /Moo-0.009014.tar.gz
 /Moo-0.091007.tar.gz
+/Moo-0.091014.tar.gz
diff --git a/perl-Moo.spec b/perl-Moo.spec
index 5f705cd..f874f85 100644
--- a/perl-Moo.spec
+++ b/perl-Moo.spec
@@ -1,6 +1,6 @@
 Name:   perl-Moo
-Version:0.091007
-Release:2%{?dist}
+Version:0.091014
+Release:1%{?dist}
 Summary:Minimalist Object Orientation (with Moose compatibility)
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -10,7 +10,7 @@ BuildArch:  noarch
 BuildRequires:  perl(Class::Method::Modifiers) = 1.04
 BuildRequires:  perl(ExtUtils::MakeMaker)
 BuildRequires:  perl(Module::Runtime) = 0.012
-BuildRequires:  perl(Role::Tiny) = 1.001001
+BuildRequires:  perl(Role::Tiny) = 1.001003
 BuildRequires:  perl(strictures) = 1.001001
 BuildRequires:  perl(Test::Fatal) = 0.003
 BuildRequires:  perl(Test::More) = 0.96
@@ -50,6 +50,9 @@ make test
 %{_mandir}/man3/*
 
 %changelog
+* Tue Jul 17 2012 Iain Arnell iarn...@gmail.com 0.091014-1
+- update to latest upstream version
+
 * Sat Jun 23 2012 Petr Pisar ppi...@redhat.com - 0.091007-2
 - Perl 5.16 rebuild
 
diff --git a/sources b/sources
index ff968b6..37f96c4 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-16d99b92097a18b19904fe0256469aa2  Moo-0.091007.tar.gz
+100937be2395297989026780454d9fee  Moo-0.091014.tar.gz
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel